Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
A common way to evaluate the performance of a system is to compare the algorithmic outputs with ground truth to identify divergences in the system’s performance and discover the...
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
The success of forensic identification largely depends on the availability of strong evidence or traces that substantiate the prosecution hypothesis that a certain person is guil...
Vasant Manohar, Dmitry B. Goldgof, Sudeep Sarkar, ...
This paper considers the problem of blindly calibrating sensor response using routine sensor network measurements. We show that as long as the sensors slightly oversample the sign...